HW1 | A1 | Midterm_1 | HW2 | Midterm_2 | A2 | A3 | HW3 | Q1 | Final | TOTAL | |
Quartile 1 | 85 | 32 | 87 | 44 | 86 | 43 | 55 | 56 | 15 | 114 | 70.23 |
Median | 94 | 35 | 95 | 46 | 94 | 44 | 75 | 62 | 18 | 134 | 74.56 |
Quartile 3 | 99 | 35 | 105 | 50 | 103 | 45 | 85 | 66 | 20 | 144 | 80.26 |
Maximum | 106 | 35 | 132 | 55 | 117 | 45 | 100 | 71 | 20 | 171 | 88.09 |
In the class, we will discuss the principles and practice of network security. Note that CSE 508 previously used to cover network as well as computer system security. Now the system security topics have been moved to another course CSE 509/409. The objective of the course is to provide a broad overview of issues and approaches, while exposing students to recent research in this area. The topics covered and the approximate number of lectures devoted to each of the topics will be as shown below.
I. Introduction (1 Lecture)II. Principles (13)
- Security threats
- Defensive mechanisms
- Problems and Pitfalls
III. Applications (4)
- Mathematical Foundations (3)
- Principles of Communication Security (10)
- secret-key cryptography (1.5)
- public-key cryptography (3)
- secure hash functions and random numbers (1)
- digital signatures (1)
- authentication protocols (2)
- cryptographic key management (1.5)
IV. Practice of Securing Systems (5)
- Authentication (Kerberos, X.509) (1)
- E-mail security (PGP) (0.5)
- Remote access/Virtual Private Networks (IPSec, SSH) (1.5)
- Web security (SSL, SET) (1)
V. Advanced Topics/Recent Research (3)
- Background (0.5)
- Firewalls (1.5)
- Network-based attacks and intrusion detection (3)
- Threshold Cryptography (1)
- Elliptic Curve Cryptography (1)
- TBD (1)
Lectures: Tue, Thu 3:50pm to 5:10pm CS Building 2310/11
R . Sekar
Office: 2313E Computer Science
email: sekar@cs.sunysb.edu
Office Hours: Tue-Thu 2:30pm to 3:30pm
TAs:
Umesh Kumar
email: umesh@cs.sunysb.edu
Office Hours: Mon 4pm to 5pm, Fri 2:30 to 3:30pm, CS 2110
Hun Jeong Kang
email: hjkang@cs.sunysb.edu
Office Hours: Fri 11am to noon, CS 2110
Cryptography and Network Security: Principles and Practice (3rd edition), by William Stallings, Prentice-Hall.
Please check out
Resource page and the Errata for this book provided by its
author, William Stallings
Mid-term I: October 7 3:50pm to 5:10pm, Harriman 137 Mid-term II: November 4 3:50pm to 5:10pm, Harriman 137 Final: December 16 2:00pm to 4:30pm, Light Engineering 102
Your final grades will be based on your performance in homework assignments, programming assignments, pop-quizzes, exams and a project. The weightages for these components will be as follows.
You will get full credit for written homeworks and quizzes as long as you
Copying homework solutions from a fellow student or from the Internet, and all other forms of academic dishonesty, are considered serious offenses, and will be prosecuted to the maximum extent permitted by university policies.
You must have completed CSE 310 (networks), or an equivalent course.
If you have a physical, psychological, medical or learning disability that may impact on your ability to carry out assigned course work, I would urge that you contact the staff in the Disabled Student Services office (DSS), n the ECC building (where the Computer Store used to be), 632-6748v/TDD. DSS will review your concerns and determine, with you, what accommodations are necessary and appropriate. All information and documentation of disability is confidential